Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Information Systems Today
Quiz 10: Securing Information Systems
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Multiple Choice
________ is the dubious practice of registering a domain name and then trying to sell the name for big bucks to the person,company,or organization most likely to want it.
Question 22
Multiple Choice
A hacker takes an individual's Social Security number,credit card number,and other personal information for the purpose of using the victim's credit rating to run up debts that are never repaid.This practice is called ________.
Question 23
Multiple Choice
________ is the use of computer and networking technologies,by individuals and organized groups,against persons or property to intimidate or coerce governments,civilians,or any segment of society in order to attain political,religious,or ideological goals.
Question 24
Multiple Choice
________ is the stealing of another person's Social Security number,credit card number,and other personal information for the purpose of using the victim's credit rating to borrow money,buy merchandise,and otherwise run up debts that are never repaid.
Question 25
Multiple Choice
________ broadly refers to the use of a computer to communicate obscene,vulgar,or threatening content that causes a reasonable person to endure distress.
Question 26
Multiple Choice
________ refers to offering stolen proprietary software for free over the Internet.
Question 27
Multiple Choice
Arbitron consultants,a leading software consulting firm in the United States,decides to launch an ERP solution.The company chooses the brand name ArbitEnterprise for the new solution.However,when the company attempts to register the domain name,it finds that the domain name is already registered to an unknown firm.The small firm is now attempting to sell the domain name to Arbitron.Which of the following terms refers to this practice of buying a domain name only to sell it for big bucks?
Question 28
Multiple Choice
A(n) ________ typically consists of a distorted image displaying a combination of letters and/or numbers that a user has to input into a form before submitting it.
Question 29
Multiple Choice
Which of the following can typically be filed for a copyright?
Question 30
Multiple Choice
Which of the following is a message passed to a Web browser on a user's computer by a Web server?
Question 31
Multiple Choice
________ is a more sophisticated fraudulent e-mail attack that targets a specific person or organization by personalizing the message in order to make the message appear as if it is from a trusted source such as an individual within the recipient's company,a government entity,or a well-known company.
Question 32
Multiple Choice
Which of the following is the most accurate definition of a botnet?
Question 33
Multiple Choice
Which of the following can typically be filed for a patent?
Question 34
Multiple Choice
________ are false messages often circulated online about new viruses,earthquakes,kids in trouble,cancer causes,or any other topic of public interest.
Question 35
Multiple Choice
Independent citizens or supporters of a country that perpetrate attacks on perceived or real enemies are called ________.
Question 36
Multiple Choice
________ is an attempt to trick financial account and credit card holders into giving away their authentication information,usually by sending spam messages to literally millions of e-mail accounts.
Question 37
Multiple Choice
Cyber criminals gain information on a victim by monitoring online activities,accessing databases,and so on and make false accusations that damage the reputation of the victim on blogs,Web sites,chat rooms,or e-commerce sites.Such acts are called ________.
Question 38
Multiple Choice
Robert receives an e-mail which says he has won an online lottery worth $50 billion.Robert had his doubts as he did not remember entering or buying any lottery ticket.It was a spam e-mail intended to obtain the bank account details and the credit card number of Robert.Which of the following is evident here?
Question 39
Multiple Choice
When using Yahoo Messenger,you get an unsolicited advertisement from a company.This advertisement contains a link to connect to the merchant's Web site.Which of the following is the best way of classifying this advertisement?